covid
Buscar en
Journal of Applied Research and Technology. JART
Toda la web
Inicio Journal of Applied Research and Technology. JART Security Improvement of Two Dynamic ID-based Authentication Schemes by Sood-Sarj...
Información de la revista
Vol. 11. Núm. 5.
Páginas 755-763 (octubre 2013)
Compartir
Compartir
Descargar PDF
Más opciones de artículo
Visitas
1308
Vol. 11. Núm. 5.
Páginas 755-763 (octubre 2013)
Open Access
Security Improvement of Two Dynamic ID-based Authentication Schemes by Sood-Sarje-Singh
Visitas
1308
R. Martínez-Peláez1, F. Rico-Novella2, J. Forné2, P. Velarde-Alvarado3
1 Institute of Informatics University of Sierra Sur Oaxaca, Miahuatlán de Porfirio Díaz, Mexico
2 Department of Telematics Engineering Universitat Politécnica de Catalunya Barcelona, Spain
3 Area of Basic Sciences and Engineering Autonomous University of Nayarit Nayarit, Tepic, Mexico
Este artículo ha recibido

Under a Creative Commons license
Información del artículo
Resumen
Texto completo
Bibliografía
Descargar PDF
Estadísticas
Tablas (1)
Table 1. Comparison between our scheme and Sood et al.'s schemes.
Abstract

In 2010, Sood-Sarje-Singh proposed two dynamic ID-based remote user authentication schemes. The first scheme is a security improvement of Liao et al.'s scheme and the second scheme is a security improvement of Wang et al.'s scheme. In both cases, the authors claimed that their schemes can resist many attacks. However, we find that both schemes have security flaws. In addition, their schemes require a verification table and time-synchronization, making the schemes unfeasible and unsecured for electronic services. In order to remedy the security flaws of Sood et al.'s schemes, we propose a robust scheme which resists the well-known attacks and achieves all the desirable security goals.

Keywords:
cryptanalysis
mutual authentication
network security
smart cards
Resumen

En el año 2010, Sood-Sarje-Singh propusieron dos esquemas de autenticación de usuario remoto. El primer esquema presenta una mejora de seguridad sobre el esquema propuesto por Liao-Lee-Hwang en el año 2005, y el segundo esquema presenta una mejora de seguridad sobre el esquema propuesto por Wang-Liu-Xiao-Dan en el año 2009. En ambos casos, los autores claman que sus esquemas pueden resistir varios ataques. Sin embargo, nosotros hemos encontrado que ambos esquemas tienen deficiencias de seguridad. Además, los esquemas propuestos requieren de una tabla de verificación y sincronización de tiempo, haciendo a los esquemas imprácticos e inseguros para servicios electrónicos. Para remediar las deficiencias de seguridad presentadas en los esquemas propuestos por Sood-Sarje-Singh, nosotros proponemos un esquema robusto de seguridad que resiste los ataques más populares y consigue todas las metas de seguridad deseadas.

Texto completo
1Introduction

Remote user authentication is a key security component for electronic services, such as e-banking and e-payments, in order to verify the real identity of each user. The most popular mechanism to carry out the authentication process is by means of password-based authentication protocols. However, the server must store and maintain the identities and password of each user in a database, making possible the insider attack [1], threats of revealing passwords in the directory [2] or modifying the verification table [3].

Although, many approaches have been proposed [4, 5] to overcome the weakness of storing users' identity and password in a database, using cryptography or one-way hash function, the security of the whole system can be broken if an attacker steals or modifies the information stored in the database. For this reason, Chan and Wu [6] proposed a remote user authentication scheme without a verification table, in 1990. The next year, Chang and Wu [2] introduced the concept of timestamp in the login request message to prevent the replay attack.

In 2002, Chien et al. [7] proposed a remote user authentication scheme which requires low-computational cost. However, Hsu [8] demonstrated that Chien et al.'s scheme is vulnerable to parallel session attack. Moreover, Ku et al. [1] demonstrated that Chien et al.'s scheme is vulnerable to insider attack and guessing attack.

Das et al. introduced the concept of dynamic ID-based [9] remote user authentication scheme using smart cards in 2004. Their scheme prevents the possibilities of an attacker knowing user's identity. However, the scheme is susceptible to insider attack, masquerade attack, and server spoofing attack [10, 11, 12, 13]. Moreover, the scheme does not provide mutual authentication and does not establish a session key. Then, Liao et al. [12] and Wang et al. [10] proposed different schemes which resolve the security flaws of Das et al.'s scheme. However, Sood et al. [14, 15] demonstrated that Liao et al.'s and Wang et al.'s schemes are vulnerable to malicious user attack, impersonation attack, stolen smart card attack, and off-line password guessing attack. In both cases, authors claimed that their schemes are more secure than previous one.

In this paper, we demonstrate that Sood et al.'s schemes [14, 15] have security drawbacks. We show that their schemes are still vulnerable to malicious user attack, stolen smart card attack, off-line ID guessing attack, impersonation attack, and server spoofing attack. In addition, their schemes are based on time-synchronization which it is still a problem [16, 17, 18] in existing networks environments because the data transmission and processing delay is uncertain. Moreover, the server maintains a verification table giving the opportunity an adversary to steal information from database. In order to remedy these security drawbacks, we propose an improvement on both schemes with more security. As a result, our scheme can withstand well-known attacks. Furthermore, the proposed scheme achieves the following security goals [19, 20]: 1) no verification table; 2) users choose password freely; 3) no password reveal; 4) mutual authentication; 5) session key agreement; 6) user anonymity; and 7) efficiency for wrong password login.

The rest of the paper is organized as follows: In Section 2, we review the schemes proposed by Sood-Sarje-Singh. Section 3 describes the cryptanalysis of Sood et al.'s schemes. In Section 4, we show the details of the proposed scheme. In section 5, we carry out the security analysis of the proposed scheme. In section 6, we compare our scheme with Sood et al.'s schemes demonstrating the enhanced security. Finally, we present the conclusions in Section 7.

2Review of Sood-Sarje-Singh's schemes

In this section, we review the dynamic ID-based remote user authentication schemes [14, 15] proposed by Sood-Sarje-Singh. Each scheme is based on one-way hash function and it is composed of four phases – registration, login, verification, and password change. The notations used throughout this paper are summarized as follows:U

User

ID

Identity of U

PW

Password ofU

S

Server

x, z

Secret keys of S

b

Nonce

h( )

One-way hash function

SK

Session key between U and S

ESK( )

Symmetric encryption using SK

DSK( )

Symmetric decryption using SK

Exclusive-OR operation

Concatenation operation

Represents a secure channel

Represents an open channel

2.1First scheme

Sood et al. proposed an improvement scheme [15] of Liao et la.'s scheme [12].

Registration phase: This phase is invoked when U wants to access S. The process is as follows:

  • U chooses her ID and PW

  • US: ID, PW

  • S chooses a random value y

  • S computes:

    N=h(PW) ⊕ h(yID) ⊕ h(x)

    B=yh(PW)

    V=h(IDPW) ⊕ PW

    D=h(yID)

  • S stores yx and IDh(x) corresponding to D in a database

  • US: smart card containing N, B, V, h( )

Login phase: When U wants to login the remote S, she inserts her smart card into the smart card reader and keys her ID′ and PW′. Then, the smart card performs the following steps:

  • Computes:

    V=h(ID′ ∥ PW′) ⊕ PW

  • Compares:

    V′?=V if holds, the identity of U is assured

  • After verification, the smart card computes:

    y=Bh(PW)

    h(x)=Nh(PW) ⊕ h(yID)

    CID=h(yID) ⊕ h(h(x) ∥ T)

    M=h(h(x) ∥ h(y) ∥ T)

  • US: CID, M, T

Verification and session key agreement phase: When S receives the login request message (CID, M, T) at time T′, S carries out the following steps:

  • Checks the validity of time interval, if (TT)ΔT, S accepts the login request of U, otherwise the login request is rejected, where ΔT is expected time interval for a transmission delay.

  • Computes:

    D=h(yID)′=CIDh(h(x) ∥ T)

  • Finds:

    Din its database

  • Extracts:

    yx and IDh(x) corresponding to Dfrom its database

  • Recovers:

    y from yx

    ID from ID ⊕ h(x)

  • Computes:

    M=h(h(x) ∥ h(y) ∥ T)

  • Compares:

    M′?=M

    Finally, U and S computes the session key SK=h(IDyh(x) ∥ T)

Password change phase: When U wants to change the password, she inserts the smart card into the smart card reader, keys her ID′ and PW′, and requests to change the password to new one, and then the smart card carries out the following operations:

  • Computes:

    V=h(ID′ ∥ PW′) ⊕ PW

  • Compares:

    V′?=V

  • Requests to U a new password PWnew

  • Computes:

    Nnew=Nh(PW) ⊕ h(PWnew)

    Bnew=Bh(PW) ⊕ h(PWnew)

    Vnew=h(IDPWnew) ⊕ PWnew

and updates the values N, B, and V stored in its memory with Nnew, Bnew, and Vnew

2.2Second scheme

Sood et al. proposed an improvement scheme [14] of Wang et la.'s scheme [10].

Registration phase: This phase is invoked when U wants to access S. The process is as follows:

  • U chooses her ID and PW

  • US: ID, PW

  • S chooses random value y

  • S computes:

    N=h(IDPW) ⊕ h(x)

    A=h(IDPW) ⊕ PWh(y)

    B=yIDPW

    D=h(IDy)

  • S stores yx and IDh(x) corresponding to D in a database

  • S ➔ U: smart containing N, A, B, h( )

Login phase: When U wants to login the remote server S, she inserts her smart card into the smart card reader and keys her ID* and PW*. Then, the smart card performs the following steps:

  • Computes:

    y=BID′ ⊕ PW

    A=h(ID′ ∥ PW) ⊕ PW′ ⊕ h(y′)

  • Compares:

    A′?=A

  • After verification, the smart card computes:

    h(x)=h(ID ∥ PW) ⊕ N

    CID=h(IDy) ⊕ h(h(x) ∥ T)

    M=h(IDh(x) ∥ yT)

  • U ➔ S: CID, M, T

Verification and session key agreement phase:

When S receives the request (CID, M, T) at time T′, S carries out the following steps:

  • Checks the validity of time interval, if (TT)ΔT, S accepts the login request of U, otherwise the login request is rejected, where ΔT is expected time interval for a transmission delay.

  • Computes:

    D=h(yID)′=CIDh(h(x) ∥ T)

  • Finds:

    Din its database

  • Recovers:

    yx and IDh(x) corresponding to D′ from its database

  • Extracts:

    y from yx

    ID from IDh(x)

  • Computes:

    M=h(IDh(x) ∥ yT)

  • Compares:

    M′?=M if holds, the legality of U is assured Finally, U and S computes the session key SK=h(h(x) ∥ IDTy)

Password change phase: When U wants to change the password, she inserts the smart card into the smart card reader, keys her ID′ and PW′, and requests to change the password to new one, and then the smart card carries out the following operations:

  • Computes:

    y=BID′ ⊕ PWA=h(ID′ ∥ PW′) ⊕ PW′ ⊕ h(y′)

  • Compares:

    A′?=A

  • Request to U a new password PWnew

  • Computes:

    Nnew=h(ID ∥ PWnew) ⊕ h(x)Anew=h(ID ∥ PWnew) ⊕ PWnewh(y)Bnew=y ⊕ ID ⊕ PWnew

    and updates the values N, A, and B stored in its memory with Nnew, Anew, and Bnew

3Cryptanalysis of Sood-Sarje-Singh's schemes

In this section, we demonstrate that Sood et al.'s schemes have security vulnerabilities which make both schemes unfeasible and unsecured for electronic services. We assume that a legal user but malicious user is the adversary and she can extract security parameters stored in her smart card by means of different methods [21, 22].

3.1First scheme

In this sub-section, we evaluate the security of the scheme proposed by Sood-Sarje-Singh in [15].

3.1.1Malicious user attack

A legal but malicious user can know h(x) as follows:

  • Keys her IDand PW

  • Computes:

    y=Bh(PW)

    h(x)=h(PW) ⊕ h(y′ ∥ ID) ⊕ N

Here, h(x) is the same value for each legal user. It is obvious that h(x) is not well-protected

3.1.2Man-in-the-middle attack

The legal but malicious user can intercept the login request message (CID, M, T) transmitted between U and S. At this moment, she knows CID, M, T, and h(x); for that reason, she can recover D=h(yID) fromCID as follows:

  • Computes:

    D=h(yID)=CIDh(h(x) ∥ T)

3.1.3Stolen smart card attack

Suppose that the legal but malicious user can obtain security parameters (N, B, V) from a legal U's smart card. Now, she knows the following security parameters: h(x), D=h(yID), N=h(PW) ⊕ h(yID) ⊕ h(x), B=yh(PW), V=h(IDPW) ⊕ PW. Then, she can recover y from B as follows:

  • Computes:

    h(PW)′=NDh(x)

    y=Bh(PW)

The attacker knows y without known user's PW

3.1.4Off-line ID guessing attack

The ID guessing attack is similar to password guessing attack described in [15], where the legal but malicious user attacks the password by picking random passwords. In this case, the attacker knows y and D=h(yID), so she needs to find the correct ID for D. The complexity of this attack depends on the length of ID.

3.1.5Impersonation attack

The legal but malicious user can forge a login request message that can pass the verification process of S because she knows D, h(x), and y. The attacker performs the following process:

  • Computes:

    h(y)

    CID=Dh(h(x) ∥ T)

    M=h(h(x) ∥ h(y) ∥ T)

  • Sends an imitative login request message (CID, M, T) to S

After S receives the login request message, S carries out the verification process and S will accept the login request because CID and M are equals to the valid login request message. Moreover, the attacker can compute the secret key SK=h(IDyh(x) ∥ T)

3.1.6Server spoofing attack

Because the legal but malicious user knows ID, y, and h(x), she can establish a secure communication with U as S.

3.2Second scheme

In this sub-section, we evaluate the security of the scheme proposed by Sood-Sarje-Singh in [14].

3.2.1Malicious user attack

A legal but malicious user can extract h(x) from N as follows:

  • Keys her IDand PW

  • Computes:

    h(x)=h(ID′ ∥ PW′) ⊕ N

Here, h(x) is the same value for each legal user. It is obvious that h(x) is not well-protected

3.2.2Man-in-the-middle attack

The legal but malicious user can intercept the login request message (CID, M, T) transmitted between a legal user U and S. At this moment, she knows CID, M, T, and h(x); for that reason, she can recoverD=h(yID) from CID as follows:

  • Computes:

    D=h(IDy)=CIDh(h(x) ∥ T)

3.2.3Steal information from a database attack

Suppose that the adversary can get access to the server and can copy the entire database to an external hard disk. Then, she can find D corresponding to D′ and extracts ID from IDh(x). The whole scheme has been broken down in terms of security.

4Proposed scheme

Based on Sood et al.'s schemes, we propose an improved scheme. The scheme is based on nonce instead of time-synchronization. Moreover, the server does not need to maintain a verification table. The scheme is composed of the following phases: registration, login, verification and session key agreement, and password change.

4.1Registration phase

This phase is invoked when U wants to access S. The process is as follows:

  • U chooses her ID, PW and b

  • U computes h(IDPWb)

  • US: ID, h(IDPWb)

  • S chooses random value y

  • S computes:

    N=h(IDh(xz) ∥ y) ⊕ h(IDPWb) ⊕ h(IDy)

    A=h(h(IDh(xz) ∥ y))

    B=h(xz) ⊕ h(h(xz) ∥ y) ⊕ ID

  • SU: smart containing N, A, B, y, h( )

    Finally, U enters b into her smart card [23]. Note that U's smart card contains N, A, B, y, b, h( ).

4.2Login phase

When U wants to login the remote server S, she inserts her smart card into the smart card reader and keys her ID′ and PW′. Then, the smart card performs the following steps:

  • Computes:

    h(IDh(xz) ∥ y)′=Nh(ID′ ∥ PW′ ∥ b) ⊕ h(ID′ ∥ y)

    A=h(h(IDh(xz) ∥ y)′)

  • Compares:

    A′ ?=A if holds, the identity of U is assured; otherwise, the process finalized

  • After verification, the smart card carries out the following operations:

  • Generates bnewas random number

  • Computes:

    CID=h(IDh(xz) ∥ y)* ⊕ h(IDy) ⊕ bnew

    SK=h(h(IDybnew))

    M=EsK(h(IDbnew))

  • US: y, B, CID, M

4.3Verification and session key agreement phase

When S receives the request (y, B, CID, M), Scarries out the following steps:

  • Computes:

    ID=h(xz) ⊕ h(h(xz) ∥ y) ⊕ B

  • Verifies the format of IDif it is not correct the request is rejected; otherwise, the process continues

    bnew=h(ID′ ∥ h(xz) ∥ y) ⊕ h(ID′ ∥ y) ⊕ CID

    h(ID′ ∥ bnew′)′

    SK=h(h(IDybnew))

    h(IDbnew)=DSK(M)

  • Compares:

    h(IDbnew)′?=h(IDbnew) if it holds, the identity of U is assured; otherwise, the process finalized

  • Generates ynew

  • Computes:

    Nnew=h(IDh(xz) ∥ ynew) ⊕ h(IDPWbnew) ⊕ h(IDynew)

    Anew=h(h(IDh(xz) ∥ ynew))

    Bnew=h(xz) ⊕ h(h(xz) ∥ ynew) ⊕ ID

    C=h(NnewAnewBnewynewBnew

    O=EsK(NnewAnewBnewynew)

  • SU: O, C

Upon receiving the login response message (O, C), U's smart card performs the following operations:

  • Compares:C′ ?=C if holds, the identity of S is assured; otherwise, the process finalized

  • Replaces N, A, B, y, and b by Nnew, Anew, Bnew, ynew, and bnew, respectively

After successful mutual authentication process, U and S have the same session key SK=h(h(IDybnew)).

4.4Password change phase

This phase is invoked whenever U wants to change her PW with a new one (PWnew). She inserts her smart card into the smart card reader and keys her ID and PW, and requests to change password. Then, her smart card carries out the following process:

  • Computes:h(IDh(xz) ∥ y)*=Nh(IDPWb) ⊕ h(IDy)

    A=h(h(IDh(xz) ∥ y)*)

  • Compares:A* ?=A if holds, the identity of U is assured and U can key a new password (PWnew); otherwise, the smart card rejects the password change request

  • Computes:Nnew=h(IDh(xz) ∥ y) ⊕ h(IDPWnewb) ⊕ h(IDy)

The value of Nnew is stored in the smart card to replace N.

5Security analysis

In this section, we demonstrate that our proposed scheme can resist very well-known attacks and achieves the desirable security goals described in [19, 20]. Table 1 shows the security comparison between our proposed scheme and Sood et al.'s schemes.

Table 1.

Comparison between our scheme and Sood et al.'s schemes.

Security goal  [15]  [14]  Our scheme 
No verification table  No  No  Yes 
Users choose password freely  Yes  Yes  Yes 
No password reveal  No  No  Yes 
Mutual authentication  Yes  Yes  Yes 
Session key agreement  Yes  Yes  Yes 
User anonymity  Yes  Yes  Yes 
No time-synchronization  No  No  Yes 
Efficiency for wrong password login  Yes  Yes  Yes 
5.1Denial of service attack

Suppose that the adversary can get access to the victim's smart card and she wants to change the password. However, the adversary will fail in this attack because the smart card verifies the identity of the owner before updates or modifies the password for another one.

5.2Impersonation attack

If an adversary wants to impersonate U, she must be able to forge a valid login message (y, B, CID, M). Suppose that the adversary has intercepted one of the victim's login request message (y, B, CID, M) and she knows the security information (N, A, B, y, b, h( )) stored in victim's smart card. However, she cannot compute a valid session key SK=h(h(IDybnew)) without the knowledge of U's ID and bnew because she cannot extract the correct ID from B=h(xz) ⊕ h(h(xz) ∥ y) ⊕ ID or bnew from CID=h(IDh(xz) ∥ y) ⊕ h(IDy) ⊕ bnew.

5.3Malicious user attack

A legal but malicious user can attempt to extract the server secret keys x and z from N=h(IDh(xz) ∥ y) ⊕ h(IDPWb) ⊕ h(IDy) or B=h(xz) ⊕ h(h(xz) ∥ y) ⊕ ID. However, this attempt will fail because it is computationally infeasible to invert the one-way hash function h( ).

5.4Off-line ID guessing attack

If the adversary tries to obtains U's ID from N=h(IDh(xz) ∥ y) ⊕ h(IDPWb) ⊕ h(IDy), A=h(h(IDh(xz) ∥ y)) or B=h(xz) ⊕ h(h(xz) ∥ y) ⊕ ID, she needs to guess three security parameters ID, x and z correctly at the same time which represents a higher challenge than just one security parameter. Moreover, the value of x and z are hidden by a one-way hash function.

5.5Parallel session attack

If the adversary has intercepted the victim's login request message (y, B, CID, M) and the login response message (O, C), she cannot compute a valid login request message by any combination of (y, B, CID, M) and (O, C). Moreover, the adversary cannot extract the U's ID, ynew and bnew from C=h(NnewAnewBnewynewbnew) or O=EsK(NnewAnewBnewynew). Furthermore, the adversary cannot compute the session key SK=h(h(IDybnew)) because she does not ID and bnew.

5.6Replay attack

If the adversary has intercepted the victim's login request message (y, B, CID, M) and the login response message (O, C), she cannot compute a valid login request message by any combination of (y, B, CID, M) and (O, C). Moreover, the adversary cannot extract the U's ID, ynew and bnew from C=h(NnewAnewBnewynewbnew or O=EsK(NnewAnewBnewynew). Furthermore, the adversary cannot know the session key SK=h(h(IDybnew) because she does not ID and bnew.

5.7Server spoofing attack

Suppose that the adversary wants to impersonate S, she must be able to forge a valid login response message (O, C). However, this attempt will fail because the adversary cannot compute a valid SK=h(h(IDybnew)) without the knowledge of x and z. Moreover, the adversary cannot compute a valid C or O without the correct U's ID.

5.8Stolen smart card attack

Suppose that the adversary has stolen victim's smart card and she can access to the security information (N, A, B, y, b, h( )) stored in victim's smart card. However, the adversary cannot obtain information for creating a valid login request message (y, B, CID, M) without the knowledge of ID and PW.

6Comparison

Table 1 shows that our proposed scheme does not need a verification table for carrying out the verification phase. On the other hand, the schemes proposed by Sood et al. require that the server maintains a verification table which represents security vulnerability for the entire system. Moreover, the schemes proposed by Sood et al. require that each user reveals her password to S, during the registration phase, while our scheme keeps the privacy of U's password. Furthermore, the proposed scheme uses nonce instead of time-stamping, avoiding the time-synchronization problem between U and S. In fact, the proposed scheme is more secure than Sood et al.'s schemes.

7Conclusions

In this paper, we analyzed two schemes by Sood-Sarje-Singh and found that both schemes are unsecured. We proposed an improvement of Sood et al.'s schemes to overcome the security flaws without damage their merits. Moreover, Table 1 demonstrates that the improved scheme can achieve all the desirable security goals, such as without maintain a verification table and no time-synchronization.

Acknowledgements

The authors would like to thank the anonymous reviewers for their valuable comments and suggestions. This research was supported by The Mexican Teacher Improvement Program (PROMEP), under the project number PROMEP/103.5/12/4525.

References
[1]
W.-C. Ku, S.-M. Chen.
Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards.
IEEE Transactions on Consumer Electronics, 50 (2004), pp. 204-207
[2]
C.-C. Chang, T.-C. Wu.
Remote password authentication with smart cards.
IEE Proceedings-E, 138 (1991), pp. 165-168
[3]
M.S. Hwang, L.H. Li.
A new remote user authentication scheme using smart card.
IEEE Transactions on Consumer Electronics, 46 (2000), pp. 28-30
[4]
A.-J. Evans, W. Kantrowitz, E. Weiss.
A user authentication scheme not requiring secrecy in the computer.
Communications of the ACM, 17 (1974), pp. 437-442
[5]
H. Feistel, W.-A. Notz, J.-L. Smith.
Some cryptographic techniques for machine to machine data communications.
Proccedings of the IEEE, 63 (1975), pp. 1545-1554
[6]
C.-C. Chang, T.-C. Wu.
A password authentication scheme without verification tables.
8th IASTED International Simposium of Applied Informatics, (1990), pp. 202-204
[7]
H.Y. Chien, J.K. Jan, Y.M. Tseng.
An Efficient and practical solution to remote authentication: smart card.
Computers & Security, 21 (2002), pp. 372-375
[8]
C.-L. Hsu.
Security of two remote user authentication schemes using smart cards.
IEEE Transaction on Consumer Electronics, 49 (2003), pp. 1196-1198
[9]
M.-L. Das, A. Saxena, V.-P. Gulati.
A Dynamic ID-based remote user authentication scheme.
IEEE Transactions on Consumer Electronics, 50 (2004), pp. 629-631
[10]
Y.-Y. Wang, J.-Y. Liu, F.X. Xiao, J. Dan.
A more efficient and secure dynamic ID-based remote user authentication scheme.
Computer Communications, 32 (2009), pp. 583-585
[11]
T. Goriparthi, M.-L. Das, A. Saxena.
An improved bilinear pairing based remote user authentication scheme.
Computer Standards & Interfaces, 31 (2009), pp. 181-185
[12]
I.-E. Liao, C.-C. Lee, M.-S. Hwang.
Security enhancement for a dynamic ID-based remote user authentication Scheme.
International Conference on Next Generation Web Services Practices, (2005), pp. 437-440
[13]
Y.-P. Liou, J. Lin, S.-S. Wang.
A New Dynamic ID-Based Remote User Authentication Scheme using Smart Cards.
pp. 198-205
[14]
S.-K. Sood, A.-K. Sarje, K. Singh.
An improvement of Wang et al.'s authentication scheme using smart cards.
pp. 29-31
[15]
S.-K. Sood, A.-K. Sarje, K. Singh.
An Improvement of Liao et al.'s Authentication Scheme using Smart Cards.
pp. 240-245
[16]
W.-S. Juang.
Efficient password authenticated key agreement using smart cards.
Computers & Security, 23 (2004), pp. 167-173
[17]
S.-W. Lee, H.-S. Kim, K.-Y. Yoo.
Efficient nonce-based remote user authentication scheme using smart cards.
Applied Mathematics and Computation, 167 (2005), pp. 355-361
[18]
H.-T. Liaw, J.-F. Lin, W.-C. Wu.
An efficient and complete remote user authentication scheme using smart cards.
Mathematical and Computer Modelling, 44 (2006), pp. 223-228
[19]
R. Madhusudhan, R.-C. Mittal.
Dynamic ID-based remote user password authentication schemes using smart cards: A review.
Journal of Network and Computer Applications, 35 (2012), pp. 1235-1248
[20]
C.-T. Li.
Secure smart card based password authentication scheme with user anonymity.
Information Technology and Control, 40 (2011), pp. 157-162
[21]
P. Kocher, J. Jaffe, B. Jun.
Differential power analysis.
Advances in Cryptology - Crypto'99, (1999), pp. 388-397
[22]
T.-S. Messerges, E.-A. Dabbish, R.-H. Sloan.
Examining smart-card security under the threat of power analysis attacks.
IEEE Transactions on Computers, 51 (2002), pp. 541-552
[23]
H.C. Hsiang, W.K. Shih.
Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment.
Computer Standards & Interfaces, 31 (2009), pp. 1118-1123
Copyright © 2013. Universidad Nacional Autónoma de México
Descargar PDF
Opciones de artículo